EP2806526B1 - Unauthorized connection detection device, unauthorized connection detection system and method for detecting unauthorized connection - Google Patents

Unauthorized connection detection device, unauthorized connection detection system and method for detecting unauthorized connection Download PDF

Info

Publication number
EP2806526B1
EP2806526B1 EP12865737.6A EP12865737A EP2806526B1 EP 2806526 B1 EP2806526 B1 EP 2806526B1 EP 12865737 A EP12865737 A EP 12865737A EP 2806526 B1 EP2806526 B1 EP 2806526B1
Authority
EP
European Patent Office
Prior art keywords
charge
information
discharge
power storage
unauthorized
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP12865737.6A
Other languages
German (de)
English (en)
French (fr)
Other versions
EP2806526A1 (en
EP2806526A4 (en
Inventor
Yuji Unagami
Natsume Matsuzaki
Motoji Ohmori
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Panasonic Intellectual Property Management Co Ltd
Original Assignee
Panasonic Intellectual Property Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Panasonic Intellectual Property Management Co Ltd filed Critical Panasonic Intellectual Property Management Co Ltd
Publication of EP2806526A1 publication Critical patent/EP2806526A1/en
Publication of EP2806526A4 publication Critical patent/EP2806526A4/en
Application granted granted Critical
Publication of EP2806526B1 publication Critical patent/EP2806526B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60LPROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
    • B60L53/00Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
    • B60L53/60Monitoring or controlling charging stations
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60LPROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
    • B60L53/00Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
    • B60L53/30Constructional details of charging stations
    • B60L53/305Communication interfaces
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60LPROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
    • B60L53/00Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
    • B60L53/30Constructional details of charging stations
    • B60L53/31Charging columns specially adapted for electric vehicles
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60LPROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
    • B60L53/00Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
    • B60L53/60Monitoring or controlling charging stations
    • B60L53/65Monitoring or controlling charging stations involving identification of vehicles or their battery types
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60LPROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
    • B60L53/00Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
    • B60L53/60Monitoring or controlling charging stations
    • B60L53/68Off-site monitoring or control, e.g. remote control
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J7/00Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
    • H02J7/00032Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries characterised by data exchange
    • H02J7/00036Charger exchanging data with battery
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J7/00Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
    • H02J7/00047Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries with provisions for charging different types of batteries
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60LPROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
    • B60L2240/00Control parameters of input or output; Target parameters
    • B60L2240/70Interactions with external data bases, e.g. traffic centres
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60LPROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
    • B60L2270/00Problem solutions or means not otherwise provided for
    • B60L2270/30Preventing theft during charging
    • B60L2270/32Preventing theft during charging of electricity
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01MPROCESSES OR MEANS, e.g. BATTERIES, FOR THE DIRECT CONVERSION OF CHEMICAL ENERGY INTO ELECTRICAL ENERGY
    • H01M10/00Secondary cells; Manufacture thereof
    • H01M10/42Methods or arrangements for servicing or maintenance of secondary cells or secondary half-cells
    • H01M10/425Structural combination with electronic components, e.g. electronic circuits integrated to the outside of the casing
    • H01M2010/4278Systems for data transfer from batteries, e.g. transfer of battery parameters to a controller, data transferred between battery controller and main controller
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J2310/00The network for supplying or distributing electric power characterised by its spatial reach or by the load
    • H02J2310/40The network being an on-board power network, i.e. within a vehicle
    • H02J2310/48The network being an on-board power network, i.e. within a vehicle for electric vehicles [EV] or hybrid vehicles [HEV]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02EREDUCTION OF GREENHOUSE GAS [GHG] EMISSIONS, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
    • Y02E60/00Enabling technologies; Technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02E60/10Energy storage using batteries
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/60Other road transportation technologies with climate change mitigation effect
    • Y02T10/70Energy storage systems for electromobility, e.g. batteries
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/60Other road transportation technologies with climate change mitigation effect
    • Y02T10/7072Electromobility specific charging systems or methods for batteries, ultracapacitors, supercapacitors or double-layer capacitors
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/60Other road transportation technologies with climate change mitigation effect
    • Y02T10/72Electric energy management in electromobility
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T30/00Transportation of goods or passengers via railways, e.g. energy recovery or reducing air resistance
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/12Electric charging stations
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/14Plug-in electric vehicles
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/16Information or communication technologies improving the operation of electric vehicles
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02T90/10Technologies relating to charging of electric vehicles
    • Y02T90/16Information or communication technologies improving the operation of electric vehicles
    • Y02T90/167Systems integrating technologies related to power network operation and communication or information technologies for supporting the interoperability of electric or hybrid vehicles, i.e. smartgrids as interface for battery charging of electric vehicles [EV] or hybrid vehicles [HEV]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S30/00Systems supporting specific end-user applications in the sector of transportation
    • Y04S30/10Systems supporting the interoperability of electric or hybrid vehicles
    • Y04S30/12Remote or cooperative charging
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S30/00Systems supporting specific end-user applications in the sector of transportation
    • Y04S30/10Systems supporting the interoperability of electric or hybrid vehicles
    • Y04S30/14Details associated with the interoperability, e.g. vehicle recognition, authentication, identification or billing

Definitions

  • the present invention relates to an unauthorized connection detecting device, an unauthorized connection detecting system, and an unauthorized connection detecting method for detecting whether or not a power storage device connectable to a charge/discharge device for charging or discharging with power is an unauthorized power storage device or whether or not the charge/discharge device is an unauthorized charge/discharge device.
  • secondary batteries are used for various purposes such as electric vehicles.
  • the secondary batteries are included in a device (hereinafter referred to as power storage device), such as an electric vehicle.
  • the power storage device is connected to a charge/discharge device to be charged or discharged.
  • some conventional techniques have been proposed to prevent a connection to an unauthorized power storage device or an unauthorized charge/discharge device (see Patent Literatures 1 and 2, for example).
  • US2011/144844A1 discloses an unauthorized connection device for a single power storage device connected to a charge device.
  • GB2462677 discloses a power supply interruption and a reauthorization method when an attempt occurs to disconnect a power storage device from the charge device while charging.
  • the present invention provides an unauthorized connection detecting device, an unauthorized connection detecting system, and an unauthorized connection detecting method which are capable of detecting an unauthorized power storage device or an unauthorized charge/discharge device that have a cryptographic module of an authentic product introduced thereinto in an unauthorized manner.
  • An unauthorized connection detecting device detects whether or not a power storage device that is connectable to a charge/discharge device for charging or discharging with power is an unauthorized power storage device.
  • the unauthorized connection detecting device includes: a communications unit which receives first charge/discharge information in which first identification information and first connection information are associated each other, the first identification information being information for identifying an encryption key of the power storage device used for mutual authentication between the charge/discharge device and the power storage device connectable to the charge/discharge device, and the first connection information being information on the power storage device and obtained when the power storage device is connected to the charge/discharge device; and an unauthorization detecting unit which detects whether or not the power storage device connected to the charge/discharge device is the unauthorized power storage device, by determining, using the first identification information and the first connection information included in the received first charge/discharge information, whether or not two or more power storage devices associated with a single first identification information item are present.
  • Such a general and specific aspect may be implemented in the form of a system, a method, an integrated circuit, a computer program, or a non-transitory computer-readable recording medium such as a CD-ROM, or any combination of systems, methods, integrated circuits, computer programs, or computer-readable recording media.
  • the present invention is defined in the appended claims and successfully implements an unauthorized connection detecting device which is capable of detecting an unauthorized power storage device or an unauthorized charge/discharge device that have a cryptographic module of an authentic product introduced thereinto in an unauthorized manner.
  • a power storage device or a charge/discharge device is not an authentic one but unauthorized one
  • such unauthorized devices could have performance problems, burst into flame, and cause electric leakage, and could be misused for theft of electricity.
  • information may be exchanged therebetween. The exchange could cause the leakage of the information.
  • Patent Literatures 1 and 2 some conventional techniques have been proposed to prevent a connection to an unauthorized power storage device or an unauthorized charge/discharge device (see Patent Literatures 1 and 2, for example).
  • the techniques involve mutual authentication between a power storage device and a charge/discharge device to determine whether the charge/discharge device can or cannot charge the power storage device.
  • the inventor has found out that the above conventional techniques have the after-described problem. Specifically, the problem is that the above conventional techniques are unable to detect an unauthorized power storage device or an unauthorized charge/discharge device, and thus might not be able to prevent a connection to the unauthorized power storage device or the unauthorized charge/discharge device.
  • an unauthorized connection detecting device detects whether or not a power storage device that is connectable to a charge/discharge device for charging or discharging with power is an unauthorized power storage device.
  • the unauthorized connection detecting device includes: a communications unit which receives first charge/discharge information in which first identification information and first connection information are associated each other, the first identification information being information for identifying an encryption key of the power storage device used for mutual authentication between the charge/discharge device and the power storage device connectable to the charge/discharge device, and the first connection information being information on the power storage device and obtained when the power storage device is connected to the charge/discharge device; and an unauthorization detecting unit which detects whether or not the power storage device connected to the charge/discharge device is the unauthorized power storage device, by determining, using the first identification information and the first connection information included in the received first charge/discharge information, whether or not two or more power storage devices associated with a single first identification information item are present
  • the unauthorized connection detecting device detects whether or not a power storage device is an unauthorized power storage device by (i) receiving the first charge/discharge information in which the first identification information for identifying a secret key of a power storage device and the first connection information on a power storage device are associated each other, and (ii) determining, based on the first charge/discharge information, whether or not two or more power storage devices associated with a single first identification information are present.
  • a single first identification information item is assigned to one power storage device.
  • the unauthorized connection detecting device 100 can determine that any one or more of the power storage devices are unauthorized ones.
  • the unauthorized connection detecting device can detect an unauthorized power storage device having a cryptographic module of an authentic product introduced in an unauthorized manner.
  • the communications unit may receive the first charge/discharge information in which the first identification information and the first connection information are associated each other, the first connection information including information indicating a time and a position when and where the power storage device was charged or discharged, and the unauthorization detecting unit may detect whether or not the power storage device connected to the charge/discharge device is the unauthorized power storage device, by determining, based on a relationship between times and positions included in a first connection information item associated with a single first identification information item, whether or not two or more power storage devices associated with the single first identification information item are present, the first connection information item being included in the first connection information, and the first connection information item and the single first identification information item being included in the received first charge/discharge information.
  • the unauthorized connection detecting device detects whether or not a power storage device is an unauthorized power storage device by determining, based on a relationship between times and positions associated with a single first identification information item, whether or not two or more power storage devices associated with the single first identification information item are present. In other words, in the case where there is an unnatural relationship between times and positions associated with a single first identification information item, the unauthorized connection detecting device determines that two or more power storage devices associated with the single first identification information item are present.
  • the unauthorized connection detecting device determines that two or more power storage devices associated with the single first identification information item are present.
  • the unauthorized connection detecting device can detect an unauthorized power storage device having a cryptographic module of an authentic product introduced in an unauthorized manner.
  • the communications unit may receive the first charge/discharge information in which the first identification information, time information, and position information are associated one another, the time information indicating a time when the charge/discharge device charged or discharged the power storage device, and the position information indicating a position where the charge/discharge device was.
  • Information on a time included in the first charge/discharge information received by the unauthorized connection detecting device is time information indicating the time at which a charge/discharge device charges or discharges a power storage device.
  • Information on a position is position information such as global positioning system (GPS) information indicating a position of the charge/discharge device. Since the above features allow the unauthorized connection detecting device to receive easily created first charge/discharge information, the unauthorized connection detecting device can easily detect an unauthorized power storage device having a cryptographic module of an authentic product introduced in an unauthorized manner.
  • GPS global positioning system
  • An unauthorized connection detecting device detects whether or not a charge/discharge device that is connectable with a power storage device and charges or discharges the power storage device is an unauthorized charge/discharge device.
  • the unauthorized connection detecting device may include: a communications unit which receives second charge/discharge information in which second identification information and second connection information are associated each other, the second identification information being information for identifying an encryption key of the charge/discharge device used for mutual authentication between the power storage device and the charge/discharge device connectable with the power storage device, and the second connection information being information on the charge/discharge device and obtained when the charge/discharge device is connected with the power storage device; and an unauthorization detecting unit which detects whether or not the charge/discharge device connected with the power storage device is the unauthorized charge/discharge device, by determining, using the second identification information and the second connection information included in the received second charge/discharge information, whether or not two or more charge/discharge devices associated with a single
  • the unauthorized connection detecting device detects whether or not a charge/discharge device is an unauthorized charge/discharge device, by (i) receiving the second charge/discharge information in which the second identification information and the second connection information are associated each other, and (ii) determining, using the second charge/discharge information, whether or not two or more charge/discharge devices associated with a single second identification information are present.
  • the second identification information is for identifying the encryption key of the charge/discharge device, and the second connection information is on the charge/discharge device.
  • a single second identification information item is assigned to one charge/discharge device.
  • the unauthorized connection detecting device 100 can determine that any one or more of the power storage devices are unauthorized ones.
  • the unauthorized connection detecting device can detect an unauthorized charge/discharge device having a cryptographic module of an authentic product introduced in an unauthorized manner.
  • the communications unit may receive the second charge/discharge information in which the second identification information and the second connection information are associated each other, the second connection information including charge/discharge device identification information identifying the charge/discharge device, and the unauthorization detecting unit may detect whether or not the charge/discharge device connected with the power storage device is the unauthorized charge/discharge device, by determining whether or not two or more charge/discharge device identification information items, included in a second connection information item associated with a single second identification information item, indicate mutually different charge/discharge devices, thereby determining whether or not two or more charge/discharge devices associated with the single second identification information item are present, the two or more charge/discharge device identification information items being included in the charge/discharge device identification information, the second connection information item being included in the second connection information, and the second connection information item and the single second identification item being included in the received second charge/discharge information.
  • the unauthorized connection detecting device detects whether or not a charge/discharge device is an unauthorized charge/discharge device, by determining whether or not two or more charge/discharge device identification information items associated with a single second identification information item indicate mutually different charge/discharge devices, thereby determining whether or not two or more charge/discharge devices associated with the single second identification information item are present.
  • the unauthorized connection detecting device determines that two or more charge/discharge devices associated with the single second identification information item are present.
  • the unauthorized connection detecting device can detect an unauthorized charge/discharge device having a cryptographic module of an authentic product introduced in an unauthorized manner.
  • the communications unit may receive the second charge/discharge information in which the second identification information and the second connection information are associated each other, the second connection information including, as the charge/discharge device identification information, position information indicating a position of the charge/discharge device, and the unauthorization detecting unit may detect whether or not the charge/discharge device connected with the power storage device is the unauthorized charge/discharge device, by determining whether or not two or more position information items, included in a second connection information item associated with a single second identification information item, indicate mutually different positions, thereby determining whether or not two or more charge/discharge devices associated with the single second identification information item are present, the two or more position information items being included in the position information, the second connection information item being included in the second connection information, and the second connection information item and the single second identification information item being included in the received second charge/discharge information.
  • the second connection information including, as the charge/discharge device identification information, position information indicating a position of the charge/discharge device
  • the charge/discharge device identification information included in the second charge/discharge information received by the unauthorized connection detecting device is position information indicating the position of a charge/discharge device.
  • the unauthorized connection detecting device detects whether or not a charge/discharge device is an unauthorized charge/discharge device, by determining whether or not two or more position information items associated with a single second identification information item indicate mutually different positions, thereby determining whether or not two or more charge/discharge devices associated with the single second identification information item are present.
  • the two or more position information items are included in the position information.
  • the charge/discharge device is provided at a predetermined position, and never found at two or more places.
  • the unauthorized connection detecting device determines that two or more charge/discharge devices associated with the single second identification information item are present.
  • the unauthorized connection detecting device can detect an unauthorized charge/discharge device having a cryptographic module of an authentic product introduced in an unauthorized manner.
  • the communications unit may receive the second charge/discharge information in which the second identification information and the second connection information are associated each other, the second connection information including direct current information indicating, as the charge/discharge device identification information, a fluctuation of a direct current provided from the charge/discharge device, and the unauthorization detecting unit may detect whether or not the charge/discharge device connected with the power storage device is the unauthorized charge/discharge device, by determining whether or not two or more direct current information items, included in a second connection information item associated with a single second identification information item, indicate mutually different fluctuations, thereby determining whether or not two or more charge/discharge devices associated with the single second identification information item, the two or more direct current information items being included in the direct current information, the second connection information item being included in the second connection information, and the second connection information item and the single second identification information item being included in the received second charge/discharge information.
  • the second connection information including direct current information indicating, as the charge/discharge device identification information, a fluctuation of
  • the charge/discharge device identification information included in the second charge/discharge information received by the unauthorized connection detecting device may be direct current information indicating a fluctuation of a direct current provided from a charge/discharge device.
  • the unauthorized connection detecting device may detect whether or not a charge/discharge device is an unauthorized charge/discharge device, by determining whether or not two or more direct current information items associated with a single second identification information item indicate mutually different fluctuations, thereby determining whether or not two or more charge/discharge devices associated with the single second identification information item are present.
  • the two or more direct current information items are included in the direct current information.
  • a direct current provided from a charge/discharge device has fluctuation which is unique to the charge/discharge device itself.
  • the charge/discharge device can be identified.
  • the unauthorized connection detecting device determines that two or more charge/discharge devices associated with the single second identification information item are present.
  • the unauthorized connection detecting device can detect an unauthorized charge/discharge device having a cryptographic module of an authentic product introduced in an unauthorized manner.
  • the communications unit may receive the second charge/discharge information in which the second identification information and the second connection information are associated each other, the second connection information including the power storage device identification information identifying the power storage device connected to the charge/discharge device, and the unauthorization detecting unit may detect whether or not the charge/discharge device connected with the power storage device is the unauthorized charge/discharge device, by determining whether or not the number of power storage devices, identified by two or more power storage device identification information items included in a second connection information item associated with a single second identification information item, is larger than or equal to a predetermined threshold, thereby determining whether or not two or more charge/discharge devices associated with the single second identification information item are present, the two or more power storage device identification information items being included in the power storage device identification information, the second connection information item being included in the second connection information, and the second connection information item and the single second identification information item being included in the received second charge/discharge information.
  • the unauthorized connection detecting device detects whether or not a charge/discharge device is an unauthorized charge/discharge device, by determining whether or not the number of power storage devices, identified by two or more power storage device identification information items associated with a single second identification information item, is larger than or equal to a predetermined threshold, thereby determining whether or not two or more charge/discharge devices associated with the single second identification information item are present.
  • the two or more power storage device identification information items being included in the power storage device identification information.
  • the number of power storage devices to be connected to one charge/discharge device is limited.
  • the unauthorized connection detecting device 100 determines that two or more charge/discharge devices associated with the single second identification information item are present.
  • the unauthorized connection detecting device can detect an unauthorized charge/discharge device having a cryptographic module of an authentic product introduced in an unauthorized manner.
  • he communications unit may receive information via one of a communications network connected with a charge station for charging the power storage device when the power storage device is connected and a communications network connected to the charge/discharge device.
  • the unauthorized connection detecting device receives information via the communications network connected either with the charging station or a charge/discharge device.
  • the unauthorized connection detecting device can easily receive the information.
  • the unauthorized connection detecting device can easily obtain information and detect an unauthorized charge/discharge device having a cryptographic module of an authentic product introduced in an unauthorized manner.
  • the present invention can be implemented not only as the unauthorized connection detecting device but also as (i) an unauthorized connection detecting system including a charge/discharge device and an unauthorized connection detecting device which detects whether or not a power storage device connectable to the charge/discharge deice is an unauthorized power storage device or (ii) a power storage device and an unauthorized connection detecting device which detects whether or not a charge/discharge device for charging or discharging the power storage device is an unauthorized charge/discharge device.
  • the present invention can be implemented in the form of an unauthorized connection detecting method including characteristic processing carried out by the unauthorized connection detecting device or the unauthorized connection detecting system as steps.
  • the steps included in the unauthorized connection detecting method may be implemented in the form of a program to be executed by a computer and a computer-readable recording medium in which the program is stored.
  • the program may be distributed via a recording medium such as a CD-ROM and a transmission medium such as the Internet.
  • the present invention may be implemented in the form of an integrated circuit having characteristic processing units included in the unauthorized connection detecting device.
  • the present invention may be implemented in the form of any given combinations of the device, the method, the integrated circuit, the computer program, and the recording medium.
  • FIG. 1 shows a structure of an unauthorized connection detecting system 10 including an unauthorized connection detecting device 100 according to the embodiment.
  • the unauthorized connection detecting system 10 includes the unauthorized connection detecting device 100, a charge/discharge device 200, a power storage device 300, and a charging station 500.
  • the unauthorized connection detecting device 100 detects one of (i) whether or not a power storage device connectable to the charge/discharge device 200 is an unauthorized power storage device and (ii) whether or not a charge/discharge device connected to the power storage device 300 is an unauthorized charge/discharge device. It is noted that the unauthorized connection detecting device 100 may be either a general-purpose computer or a computer especially for detecting the unauthorized charge/discharge device or the unauthorized power storage device. The unauthorized connection detecting device 100 shall be detailed later.
  • the charge/discharge device 200 is connected with a power storage device, such as the power storage device 300, and charges or discharges the power storage device with power.
  • a power storage device such as the power storage device 300
  • the charge/discharge device 200 is an authentic one and could be connected with an unauthorized power storage device.
  • the charge/discharge device 200 is connected to a distribution board in a house 400, and supplies power to a load for use in the house 400 and receives power from the house 400.
  • the charge/discharge device 200 is connected to the unauthorized connection detecting device 100 via the house 400 and a communications network 600.
  • the charge/discharge device 200 can transmit the information held in itself to the unauthorized connection detecting device 100.
  • the charge/discharge device 200 shall be detailed later.
  • the power storage device 300 is connected to a charge/discharge device, such as the charge/discharge device 200.
  • the power storage device 300 receives power from and discharges power to the charge/discharge device 200.
  • the power storage device 300 is an authentic one and could be connected to an unauthorized charge/discharge device.
  • the power storage device 300 is an electric vehicle including a secondary battery such as a lithium-ion secondary battery; however, the power storage device 300 shall not be limited to an electric vehicle.
  • the power storage device 300 When connected to the charging station 500, the power storage device 300 can be charged by the charging station 500 with power.
  • the power storage device 300 is connected to the unauthorized connection detecting device 100 via the charging station 500 and the communications network 600. Then, the power storage device 300 can transmit the information held in itself to the unauthorized connection detecting device 100.
  • the power storage device 300 shall be detailed later.
  • the charging station 500 is a facility to charge a power storage device, such as the power storage device 300, with power. Moreover, following an instruction of the unauthorized connection detecting device 100, the charging station 500 transmits the information held in the power storage device 300 to the unauthorized connection detecting device 100.
  • FIG. 2 depicts a block diagram showing a functional structure of the unauthorized connection detecting device 100 according to the embodiment.
  • the unauthorized connection detecting device 100 includes a communications unit 110, an unauthorization detecting unit 120, a control unit 130, and a storage unit 140. Moreover, the storage unit 140 stores secret key data 141, a public key certificate 142, first charge/discharge information 143, and second charge/discharge information 144.
  • the communications unit 110 transmits and receives information to and from the charge/discharge device 200 connected to the house 400 or the power storage device 300 connected to the charging station 500. Specifically, the communications unit 110 receives the first charge/discharge information in which first identification information and first connection information are associated each other. In other words, the communications unit 110 receives the later-described first charge/discharge information 273 from the charge/discharge device 200 via the communications network 600 with which the charge/discharge device 200 is connected. Then, the first charge/discharge information 273 received by the communications unit 110 is stored by the control unit 130 in the first charge/discharge information 143 in the storage unit 140.
  • FIG. 3 exemplifies the first charge/discharge information 143 according to the embodiment.
  • the first charge/discharge information 143 is an information group in which the first identification information and the first connection information are associated each other.
  • the first identification information is information for identifying an encryption key of a power storage device used for mutual authentication between the charge/discharge device 200 and the power storage device connectable to the charge/discharge device 200.
  • the first identification information is ID information of a public key certificate, so that the ID information is used for identifying the public key certificate of a power storage device connectable to the charge/discharge device 200.
  • the first connection information is information on a power storage device and obtained when the power storage device is connected to the charge/discharge device 200.
  • the first connection information includes information indicating a time and a position when and where the power storage device was charged or discharged.
  • the communications unit 110 receives the first charge/discharge information 273 in which the first identification information and the first connection information are associated each other.
  • the first connection information includes information indicating a time and a position when and where a power storage device was charged or discharged.
  • the first connection information includes (i) time information indicating a time at which the charge/discharge device 200 charged or discharged the power storage device and (ii) position information indicating where the charge/discharge device 200 was.
  • the position information may be, for example, GPS information of the charge/discharge device 200. It is noted that, in the case where address information of the charge/discharge device 200 is previously registered in the unauthorized connection detecting device 100, the position information may be the ID information of the charge/discharge device 200 to identify the charge/discharge device 200.
  • the communications unit 110 receives from the charge/discharge device 200 the first charge/discharge information 273 in which the first identification information, the time information, and the position information are associated one another.
  • the time information indicates a time when the charge/discharge device 200 charged or discharged a power storage device
  • the position information indicates a position where the charge/discharge device 200 was.
  • the first charge/discharge information 273 is stored by the control unit 130 on the first charge/discharge information 143 in the storage unit 140.
  • the communications unit 110 receives the second charge/discharge information in which second identification information and second connection information are associated each other. Specifically, when the power storage device 300 is connected to the charging station 500, the communications unit 110 receives the after-described second charge/discharge information 373 from the power storage device 300 via the communications network 600. Then, the second charge/discharge information 373 received by the communications unit 110 is stored by the control unit 130 on the second charge/discharge information 144 in the storage unit 140.
  • FIG. 4 exemplifies the second charge/discharge information 144 according to the embodiment.
  • the second charge/discharge information 144 is an information group in which the second identification information and the second connection information are associated each other.
  • the second identification information is information for identifying the encryption key of a charge/discharge device used for mutual authentication between the power storage device 300 and the charge/discharge device connectable with the power storage device 300.
  • the second identification information is ID information of a public key certificate, so that the ID information is used for identifying the public key certificate of a charge/discharge device connectable to the power storage device 300.
  • the second connection information is information on a charge/discharge device and obtained when charge/discharge device is connected with the power storage device 300.
  • the second connection information includes charge/discharge device identification information for identifying the charge/discharge device and power storage device identification information for identifying the power storage device 300 connected to the charge/discharge device.
  • the charge/discharge device identification information is position information, such as GPS information indicating the position of the charge/discharge device. It is noted that the charge/discharge device identification information may be position information, such as GPS information, indicating the position of the power storage device 300 obtained when the power storage device 300 was connected to a charge/discharge device.
  • the charge/discharge device identification information shall not be limited to the above-described position information; instead, the charge/discharge device identification information may be, for example, direct current information which can identify a charge/discharge device.
  • the charge/discharge device identification information may be, for example, direct current information which can identify a charge/discharge device.
  • a direct current provided from a charge/discharge device has fluctuation which is unique to the charge/discharge device itself.
  • the charge/discharge device identification information can identify a charge/discharge device.
  • the power storage device identification information is, for example, ID information on a power storage device for identifying the power storage device 300. It is noted that any information may be used as the power storage device identification information as far as the information can identify the power storage device.
  • the information includes ID information of a public key certificate, so that the ID information is used for identifying the public key certificate of the power storage device 300.
  • the communications unit 110 receives the second charge/discharge information 373 from the power storage device 300.
  • the second charge/discharge information 373 associates the second identification information with the second connection information that includes (i) the charge/discharge device identification information for identifying a charge/discharge device and (ii) the power storage device identification information for identifying the power storage device 300 connected to the charge/discharge device.
  • the second charge/discharge information 373 received by the communications unit 110 is stored by the control unit 130 on the second charge/discharge information 144 in the storage unit 140.
  • the unauthorization detecting unit 120 detects whether or not a power storage device connected to the charge/discharge device 200 is an unauthorized power storage device by determining, using the first identification information and the first connection information included in the first charge/discharge information received by the communications unit 110, whether or not two or more power storage devices associated with a single first identification information item are present.
  • the unauthorization detecting unit 120 reads through the control unit 130 the first charge/discharge information 143 stored in the storage unit 140, and performs the above detection.
  • the unauthorization detecting unit 120 detects whether or not a power storage device connected to the charge/discharge device 200 is an unauthorized power storage device, by determining, based on a relationship between times and positions included in a first connection information item associated with a single first identification information item, whether or not two or more power storage devices associated with the single first identification information item are present.
  • the first connection information item is included in the first connection information
  • the first connection information item and the single first identification information item are included in the first charge/discharge information.
  • the unauthorization detecting unit 120 detects whether or not a charge/discharge device connected with the power storage device 300 is an unauthorized charge/discharge device, by determining, using the second identification information and the second connection information included in the second charge/discharge information received by the communications unit 110, whether or not two or more charge/discharge devices associated with a single second identification information item are present. In other words, the unauthorization detecting unit 120 reads through the control unit 130 the second charge/discharge information 144 stored in the storage unit 140, and performs the above detection.
  • the unauthorization detecting unit 120 detects whether or not the charge/discharge device connected with the power storage device 300 is an unauthorized charge/discharge device, by determining whether or not two or more charge/discharge device identification information items, included in a second connection information item associated with a single second identification information item, indicate mutually different charge/discharge devices, thereby determining whether or not two or more charge/discharge devices associated with the single second identification information item are present.
  • the two or more charge/discharge device identification information items are included in the charge/discharge device identification information
  • the second connection information item is included in the second connection information
  • the second connection information item and the single second identification item are included in the second charge/discharge information.
  • the unauthorization detecting unit 120 detects whether or not the charge/discharge device connected with the power storage device 300 is an unauthorized charge/discharge device, by determining whether or not two or more position information items, included in a second connection information item associated with a single second identification information item, indicate mutually different positions, thereby determining whether or not two or more charge/discharge devices associated with the single second identification information item are present.
  • the two or more position information items are included in the position information
  • the second connection information item is included in the second connection information
  • the second connection information item and the single second identification information item are included in the single second identification information.
  • the unauthorization detecting unit 120 detects whether or not the charge/discharge device connected with the power storage device 300 is an unauthorized charge/discharge device, by determining whether or not the number of the power storage devices 300, identified by two or more power storage device identification information items included in a second connection information item associated with a single second identification information item, is larger than or equal to a predetermined threshold, thereby determining whether or not two or more charge/discharge devices associated with the single second identification information item are present.
  • the two or more power storage device identification information items are included in the power storage device identification information
  • the second connection information item is included in the second connection information
  • the second connection information item and the single second identification information item are included in the second charge/discharge information
  • the control unit 130 gives an instruction to and controls the communications unit 110 and the unauthorization detecting unit 120.
  • control unit 130 (i) writes, in the first charge/discharge information 143 in the storage unit 140, the first charge/discharge information 273 received by the communications unit 110 from the charge/discharge device 200, and (ii) writes, in the second charge/discharge information 144 in the storage unit 140, the second charge/discharge information 373 received by the communications unit 110 from the power storage device 300.
  • control unit 130 reads the first charge/discharge information 143 or the second charge/discharge information 144 stored in the storage unit 140, and provides the read first charge/discharge information 143 or the second charge/discharge information 144 to the unauthorization detecting unit 120.
  • control unit 130 is also capable of creating a list of cryptographic modules of an unauthorized power storage device or an unauthorized charge/discharge device detected by the unauthorization detecting unit 120.
  • the secret key data 141 and the public key certificate 142 stored in the storage unit 140 are used for mutual authentication when the communications unit 110 receives information from the charge/discharge device 200 or the power storage device 300.
  • FIG. 5 depicts a block diagram showing a functional structure of the charge/discharge device 200 according to the embodiment.
  • the charge/discharge device 200 includes a communications unit 210, a certificate information obtaining unit 220, a certificate verification unit 230, a time information detecting unit 240, a position information detecting unit 250, a control unit 260, and a storage unit 270.
  • the storage unit 270 stores secret key data 271, a public key certificate 272, and first charge/discharge information 273.
  • the communications unit 210 transmits and receives information to and from one of the unauthorized connection detecting device 100 and a power storage device. Specifically, the communications unit 210 transmits the first charge/discharge information 273 that is stored in the storage unit 270 to the unauthorized connection detecting device 100 via the house 400 and the communications network 600.
  • the first charge/discharge information 273 is created when the power storage device is connected to the charge/discharge device 200. Similar to the first charge/discharge information 143 shown in FIG. 3 , the first charge/discharge information 273 is an information group in which the first identification information and the first connection information (time information and position information) are associated each other.
  • the first identification information is ID information of a public key certificate, so that the ID information is used for identifying the public key certificate of the power storage device connected to the charge/discharge device 200.
  • the first identification information is obtained by the certificate information obtaining unit 220 when the power storage device is connected to the charge/discharge device 200.
  • the certificate information obtaining unit 220 obtains the ID information of the public key certificate from the power storage device via the communications unit 210 when the power storage device is connected to the charge/discharge device 200, and stores the information in the first charge/discharge information 273 in the storage unit 270.
  • the time information in the first connection information indicates a time when the charge/discharge device 200 charged or discharged the power storage device.
  • the time information is obtained by the time information detecting unit 240 when the power storage device is connected to the charge/discharge device 200.
  • the time information detecting unit 240 obtains the time information when the power storage device is connected to the charge/discharge device 200, and stores the information in the first charge/discharge information 273 in the storage unit 270.
  • the position information in the first connection information includes GPS information indicating the position of the charge/discharge device 200.
  • the position information is obtained by the position information detecting unit 250 when the power storage device is connected to the charge/discharge device 200.
  • the position information detecting unit 250 obtains the position information when the power storage device is connected to the charge/discharge device 200, and stores the information in the first charge/discharge information 273 in the storage unit 270.
  • the position information may be the ID information of the charge/discharge device 200 for identifying the charge/discharge device 200.
  • the ID information of the charge/discharge device 200 is obtained by the position information detecting unit 250 when the power storage device is connected to the charge/discharge device 200.
  • the certificate verification unit 230 When a power storage device is connected to the charge/discharge device 200, the certificate verification unit 230 performs mutual authentication between the power storage device and the charge/discharge device 200 using the secret key data 271 and the public key certificate 272 stored in the storage unit 270. A specific description of how the certificate verification unit 230 performs the mutual authentication shall be described later.
  • the control unit 260 controls the communications unit 210, the certificate information obtaining unit 220, the certificate verification unit 230, the time information detecting unit 240, and the position information detecting unit 250.
  • the control unit 260 when a power storage device is connected to the charge/discharge device 200, the control unit 260 causes the certificate information obtaining unit 220 to obtain first identification information, the time information detecting unit 240 to obtain time information, and the position information detecting unit 250 to obtain position information. Then, the control unit 260 stores the obtained information in the first charge/discharge information 273 in the storage unit 270. In addition, the control unit 260 causes the communications unit 210 to read the first charge/discharge information 273 from the storage unit 270 and to transmit the read first charge/discharge information 273 to the unauthorized connection detecting device 100.
  • control unit 260 causes the certificate verification unit 230 to perform, via the communications unit 210, mutual authentication between the power storage device and the charge/discharge device 200.
  • FIG. 6 depicts a block diagram showing a functional structure of the power storage device 300 according to the embodiment.
  • the power storage device 300 includes a communications unit 310, a certificate information obtaining unit 320, a certificate verification unit 330, a charge/discharge device identification information obtaining unit 340, a power storage device identification information obtaining unit 350, a control unit 360, and a storage unit 370.
  • the storage unit 370 stores a secret key data 371, a public key certificate 372, and the second charge/discharge information 373.
  • the communications unit 310 transmits and receives information to and from one of the unauthorized connection detecting device 100 and a charge/discharge device power storage device. Specifically, the communications unit 310 transmits the second charge/discharge information 373, which is stored in the storage unit 370, to the unauthorized connection detecting device 100 via the charging station 500 and the communications network 600.
  • the second charge/discharge information 373 is created when the power storage device 300 is connected to the charge/discharge device. Similar to the second charge/discharge information 144 shown in FIG. 4 , the second charge/discharge information 373 is a group of information in which the second identification information and the second connection information (the charge/discharge device identification information and the power storage device identification information) are associated each other.
  • the second identification information is ID information of a public key certificate, so that the ID information is used for identifying the public key certificate of the charge/discharge device connected with the power storage device 300.
  • the first identification information is obtained by the certificate information obtaining unit 320 when the charge/discharge device is connected to the power storage device 300.
  • the certificate information obtaining unit 320 obtains the ID information of the public key certificate from the charge/discharge device via the communications unit 310 when the charge/discharge device is connected to the power storage device 300, and stores the information in the second charge/discharge information 373 in the storage unit 370.
  • the charge/discharge device identification information in the second connection information is, for example, capable of identifying a charge/discharge device, such as GPS information indicating a position of the charge/discharge device.
  • the charge/discharge device identification information is obtained by the power storage device identification information obtaining unit 350 when the charge/discharge device is connected to the power storage device 300.
  • the power storage device identification information obtaining unit 350 obtains the charge/discharge device identification information when the charge/discharge device is connected to the power storage device 300, and stores the information in the second charge/discharge information 373 in the storage unit 370.
  • the power storage device identification information in the second connection information is, for example, capable of identifying a power storage device 300, such as ID information for identifying the power storage device 300.
  • the power storage device identification information is obtained by the charge/discharge device identification information obtaining unit 340 when the charge/discharge device is connected with the power storage device 300.
  • the charge/discharge device identification information obtaining unit 340 obtains the charge/discharge device identification information when the charge/discharge device is connected with the power storage device 300, and stores the information in the second charge/discharge information 373 in the storage unit 370.
  • the certificate verification unit 330 When a charge/discharge device is connected with the power storage device 300, the certificate verification unit 330 performs mutual authentication between the charge/discharge device and the power storage device 300 using the secret key data 371 and the public key certificate 372 stored in the storage unit 370. A specific description of how the certificate verification unit 330 performs the mutual authentication shall be described later.
  • the control unit 360 controls the communications unit 310, the certificate information obtaining unit 320, the certificate verification unit 330, the charge/discharge device identification information obtaining unit 340, and the power storage device identification information obtaining unit 350.
  • the control unit 360 when a charge/discharge device is connected with the power storage device 300, the control unit 360 causes the certificate information obtaining unit 320 to obtain second identification information, the charge/discharge device identification information obtaining unit 340 to obtain charge/discharge deice identification information, and the power storage device identification information obtaining unit 350 to obtain power storage device identification information. Then, the control unit 360 stores the information in the second charge/discharge information 373 in the storage unit 370. In addition, the control unit 360 causes the communications unit 310 to read the second charge/discharge information 373 from the storage unit 370 and to transmit the read second charge/discharge information 373 to the unauthorized connection detecting device 100.
  • control unit 360 causes the certificate verification unit 330 to perform, via the communications unit 310, mutual authentication between the charge/discharge device and the power storage device 300.
  • FIG. 7 depicts a flowchart exemplifying an operation performed by the charge/discharge device 200 according to the embodiment.
  • the communications unit 210 first detects that a power storage device has been connected to the charge/discharge device 200 (S102).
  • the charge/discharge device 200 can be connected not only to an authentic power storage device 300 but also to an unauthorized power storage device.
  • the certificate verification unit 230 performs mutual authentication between the power storage device and the charge/discharge device 200, using the secret key data 271 and the public key certificate 272 stored in the storage unit 270 (S104). A specific description of how the certificate verification unit 230 performs the mutual authentication shall be described later.
  • the processing proceeds to the next step.
  • the mutual authentication could be properly performed between the unauthorized power storage device and the charge/discharge device 200, in the case where a cryptographic module of the authentic power storage device 300 is analyzed in an unauthorized manner and the analyzed module is cloned and fraudulently introduced into the unauthorized power storage device.
  • the certificate information obtaining unit 220 obtains the first identification information from the power storage device connected to the charge/discharge device 200 (S106). Specifically, the certificate information obtaining unit 220 obtains ID information of the public key certificate of the power storage device.
  • the time information detecting unit 240 obtains time information and the position information detecting unit 250 obtains position information, so that the charge/discharge device 200 obtains first connection information including the time information and the position information (S108).
  • the position information may be the ID information of the charge/discharge device 200 to identify the charge/discharge device 200.
  • the ID information of the charge/discharge device 200 may be obtained by the position information detecting unit 250 when the power storage device is connected to the charge/discharge device 200.
  • control unit 260 stores in the first charge/discharge information 273 in the storage unit 270 the first identification information and the first connection information obtained by the communications unit 210, the certificate information obtaining unit 220, and the time information detecting unit 240 (S110).
  • the control unit 260 determines whether or not the communications unit 210 can transmit (upload) the first charge/discharge information 273 to the unauthorized connection detecting device 100 (S112). For example, when the charge/discharge device 200 is connected to the unauthorized connection detecting device 100 via the communications network 600, the control unit 260 determines that the communications unit 210 can upload the first charge/discharge information 273 to the unauthorized connection detecting device 100.
  • the control unit 260 causes the communications unit 210 to read the first charge/discharge information 273 from the storage unit 270, and to transmit the read first charge/discharge information 273 to the unauthorized connection detecting device 100 (S114).
  • the control unit 260 finishes processing.
  • control unit 260 may wait until the communications unit 210 is ready to upload the first charge/discharge information 273 to the unauthorized connection detecting device 100. Upon determining that the communications unit 210 is ready for the upload, the control unit 260 may cause the communications unit 210 to transmit the first charge/discharge information 273 to the unauthorized connection detecting device 100.
  • control unit 260 may wait until a predetermined amount of information is accumulated in the first charge/discharge information 273. Then, the control unit 260 may cause the communications unit 210 to transmit the first charge/discharge information 273 to the unauthorized connection detecting device 100.
  • FIG. 8 depicts a flowchart exemplifying an operation performed by the power storage device 300 according to the embodiment.
  • the communications unit 310 first detects that a charge/discharge device has been connected to the power storage device 300 (S202).
  • the power storage device 300 can be connected not only to an authentic charge/discharge device 200 but also to an unauthorized charge/discharge device.
  • the certificate verification unit 330 performs mutual authentication between the power storage device 300 and the connected charge/discharge device, using the secret key data 371 and the public key certificate 372 stored in the storage unit 370 (S204).
  • S204 secret key data 371 and the public key certificate 372 stored in the storage unit 370
  • the processing proceeds to the next step.
  • the connected charge/discharge device is an unauthorized one
  • the mutual authentication could be properly performed between the unauthorized connected charge/discharge device and the power storage device 300, in the case where a cryptographic module of the authentic charge/discharge device 200 is analyzed in an unauthorized manner and the analyzed module is cloned and fraudulently introduced into the unauthorized charge/discharge device.
  • the certificate information obtaining unit 320 obtains the second identification information from the charge/discharge device connected with the power storage device 300 (S206). Specifically, the certificate information obtaining unit 320 obtains ID information of the public key certificate of the power storage device.
  • the charge/discharge device identification information obtaining unit 340 obtains charge/discharge device identification information and the power storage device identification information obtaining unit 350 obtains power storage device identification information, so that the power storage device 300 obtains second connection information including the charge/discharge device identification information and the power storage device identification information (S208).
  • control unit 360 stores in the first charge/discharge information 373 in the storage unit 370 the second identification information and the second connection information obtained by the communications unit 310, the certificate information obtaining unit 320, and the charge/discharge device identification information obtaining unit 340 (S210).
  • the control unit 360 determines whether or not the communications unit 310 can transmit (upload) the second charge/discharge information 373 to the unauthorized connection detecting device 100 (S212). For example, when the power storage device 300 is connected to the charging station 500, the power storage device 300 is connected to the unauthorized connection detecting device 100 via the communications network 600. Hence, the control unit 360 determines that the communications unit 310 can upload the second charge/discharge information 373 to the unauthorized connection detecting device 100.
  • the control unit 360 causes the communications unit 310 to read the second charge/discharge information 373 from the storage unit 370, and to transmit the read second charge/discharge information 373 to the unauthorized connection detecting device 100 (S214).
  • the control unit 360 finishes processing.
  • control unit 360 may wait until the communications unit 310 is ready to upload the second charge/discharge information 373 to the unauthorized connection detecting device 100. Upon determining that the communications unit 310 is ready for the upload, the control unit 360 may cause the communications unit 310 to transmit the second charge/discharge information 373 to the unauthorized connection detecting device 100.
  • control unit 360 may wait until a predetermined amount of information is accumulated in the second charge/discharge information 373. Then, the control unit 360 may cause the communications unit 310 to transmit the second charge/discharge information 373 to the unauthorized connection detecting device 100.
  • the processing performed by the power storage device 300 ends.
  • mutual authentication processing (S104 in FIG. 7 and S204 in FIG. 8 ) performed by a charge/discharge device and a power storage unit. It is noted that the mutual authentication processing is performed (i) by an authentic charge/discharge device 200 and one of an authentic power storage unit and an unauthorized power storage unit, and (ii) by an authentic power storage device 300 and one of an authentic charge/discharge device and an unauthorized charge/discharge device. In the processing below, the mutual authentication is performed by the charge/discharge device 200 and the power storage device 300 for the sake of simplicity.
  • FIG. 9 depicts a flowchart exemplifying mutual authentication processing performed by the charge/discharge device 200 and the power storage device 300 according to the embodiment.
  • the certificate verification unit 230 in the charge/discharge device 200 first transmits the public key certificate 272 stored in the storage unit 270 to the certificate verification unit 330 in the power storage device 300 (S302). Furthermore, the certificate verification unit 330 transmits the public key certificate 372 stored in the storage unit 370 to the certificate verification unit 230 (S304).
  • the certificate verification unit 230 checks the received certificate (S306). In the case where the certificate is invalid (S310: N), the processing ends. In the case where the certificate is valid (S310: Y), the processing proceeds to the next step.
  • the certificate verification unit 330 also checks the received certificate (S308). In the case where the certificate is invalid (S312: N), the processing ends. In the case where the certificate is valid (S312: Y), the processing proceeds to the next step.
  • the certificate verification unit 330 creates a random number r1, and transmits the random number r1 to the certificate verification unit 230 (S314). Then, the certificate verification unit 230 receives the random number r1. In response to the random number r1, the certificate verification unit 230 creates a signature Sig(r1) using a secret key SKs described in the secret key data 271, and a random number r2.
  • the certificate verification unit 230 transmits the random number r2 and the signature Sig(r1) to the certificate verification unit 330 (S316). Then, the certificate verification unit 330 receives the random number r2 and the signature Sig(r1), and checks the signature Sig(r1) using a public key described in the public key certificate 272.
  • the certificate verification unit 330 determines that the signature Sig(r1) is valid, the certificate verification unit 330 creates, in response to the random number r2, a signature Sig(r2) using a secret key SK_i described in the secret key data 371. Then, the certificate verification unit 330 transmits the signature Sig(r2) to the certificate verification unit 230 (S318). In the case where the certificate verification unit 330 determines that the signature Sig(r1) is invalid, the certificate verification unit 330 returns NG to the certificate verification unit 230, and breaks off the connections with the charge/discharge device 200.
  • the certificate verification unit 230 receives the signature Sig(r2), and checks the signature Sig(r2) using a public key described in the public key certificate 372.
  • the certificate verification unit 230 determines that the signature Sig(r2) is valid, the certificate verification unit 230 returns OK to the certificate verification unit 330 (S320). In the case where the certificate verification unit 230 determines that the signature Sig(r2) is invalid, the certificate verification unit 230 returns NG to the certificate verification unit 330, and breaks off the connections with the charge/discharge device 300.
  • FIG. 10 depicts a flowchart exemplifying an operation of how the unauthorized connection detecting device 100 according to the embodiment detects an unauthorized power storage device.
  • the communications unit 110 first receives the first charge/discharge information 273 from the charge/discharge device 200 via the communications network 600 (S402). Then, the first charge/discharge information 273 received by the communications unit 110 is stored by the control unit 130 in the first charge/discharge information 143 in the storage unit 140 (S402).
  • the communications unit 110 receives first charge/discharge information 273 corresponding to the authentic power storage apparatus.
  • the communications unit 110 receives first charge/discharge information 273 corresponding to the unauthorized power storage device.
  • the unauthorization detecting unit 120 determines whether or not two or more power storage devices associated with a single first identification information item are present (S404).
  • the unauthorization detecting unit 120 detects that the power storage device connected to the charge/discharge device 200 is an unauthorized one (S406). In other words, the unauthorization detecting unit 120 reads the first charge/discharge information 143 stored in the storage unit 140 to perform the above detection.
  • the unauthorization detecting unit 120 detects whether or not the power storage device connected to the charge/discharge device 200 is an unauthorized power storage device, by determining, based on a relationship between times and positions included in a first connection information item associated with a single first identification information item, whether or not two or more power storage devices associated with the single first identification information item are present.
  • the first connection information item is included in the first connection information
  • the first connection information item and the single first identification information item are included in the first charge/discharge information.
  • the unauthorization detecting unit 120 determines whether or not an unnatural relationship is found between the times and positions (i) included in the first connection information and (ii) associated with a single first identification information item, and determines whether or not two or more power storage devices associated with the single first identification information are present.
  • the unnatural relationship is the case where, for example, a power storage device cannot possibly travel a distance between the positions within a time period between the times. Based on a previously prepared database table, the unauthorization detecting unit 120 can determine whether or not the relationship is unnatural.
  • the information on the positions may be the ID information of the charge/discharge device 200.
  • control unit 130 creates a list of cryptographic modules of unauthorized power storage devices detected by the unauthorization detecting unit 120, and stores the list in the storage unit 140.
  • the unauthorization detecting unit 120 determines that the power storage device is not an unauthorized one and finishes the processing.
  • the unauthorized connection detecting device 100 finishes the processing for detecting an unauthorized power storage device.
  • FIG. 11 depicts a flowchart exemplifying an operation of how the unauthorized connection detecting device 100 according to the embodiment detects an unauthorized charge/discharge device.
  • the communications unit 110 first receives the second charge/discharge information 373 from the power storage device 300 via the communications network 600 (S502). Then, the second charge/discharge information 373 received by the communications unit 110 is stored by the control unit 130 in the second charge/discharge information 144 in the storage unit 140 (S502).
  • the communications unit 110 receives second charge/discharge information 373 corresponding to the authentic power storage apparatus.
  • the communications unit 110 receives second charge/discharge information 373 corresponding to the unauthorized power storage device.
  • the unauthorization detecting unit 120 determines whether or not two or more charge/discharge devices associated with a single second identification information item are present (S504).
  • the unauthorization detecting unit 120 detects that the charge/discharge device connected with the power storage device 300 is an unauthorized one (S506). In other words, the unauthorization detecting unit 120 reads the second charge/discharge information 144 stored in the storage unit 140 to perform the above detection.
  • the unauthorization detecting unit 120 detects whether or not a charge/discharge device connected with the power storage device 300 is an unauthorized charge/discharge device, by determining whether or not two or more charge/discharge device identification information items, included in a second connection information associated with a single second identification information item, indicate mutually different charge/discharge devices, and thereby determining whether or not two or more charge/discharge devices associated with the single second identification information item are present.
  • the two or more charge/discharge device identification information items are included in the charge/discharge device identification information
  • the second connection information item is included in the second connection information
  • the second connection information item and the single second identification item are included in the second charge/discharge information.
  • the unauthorization detecting unit 120 detects whether or not a charge/discharge device connected with the power storage device 300 is an unauthorized charge/discharge device, by determining whether or not two or more position information items, included in a second connection information item associated with a single second identification information item, indicate mutually different positions, thereby determining whether or not two or more charge/discharge devices associated with the single second identification information item are present.
  • the two or more position information items are included in the position information
  • the second connection information item is included in the second connection information
  • the second connection information item and the single second identification information item are included in the single second identification information.
  • the position information items can indicate different positions each other because the owner of the charge/discharge device has moved to a new address.
  • the unauthorization detecting unit 120 obtains information showing that the charge/discharge device has moved to accurately determine whether or not two or more charge/discharge devices associated with the above single identification information item are present.
  • the unauthorization detecting unit 120 may detect whether or not a charge/discharge device connected with the power storage device 300 is an unauthorized charge/discharge device by determining whether or not the number of the power storage devices 300, identified by two or more power storage device identification information items included in a second connection information item associated with a single second identification information item, is larger than or equal to a predetermined threshold, thereby determining whether or not two or more charge/discharge devices associated with the single second identification information item are present.
  • the two or more power storage device identification information items are included in the power storage device identification information
  • the second connection information item is included in the second connection information
  • the second connection information item and the single second identification information item are included in the second charge/discharge information
  • the unauthorization detecting unit 120 may change the above threshold, depending on the kind of a charge/discharge device. In other words, in the case where the charge/discharge device is for a commercial facility or a charging station, the threshold of the unauthorization detecting unit 120 may be set higher than that of the charge/discharge device for the standard home.
  • control unit 130 creates a list of cryptographic modules of unauthorized charge/discharge devices detected by the unauthorization detecting unit 120, and stores the list in the storage unit 140.
  • the unauthorization detecting unit 120 determines that the charge/discharge device is not an unauthorized one and finishes the processing.
  • the unauthorized connection detecting device 100 finishes the processing for detecting an unauthorized charge/discharge device.
  • FIG. 12 depicts a flowchart exemplifying an operation of how the unauthorized connection detecting device 100 according to Modification 1 of the embodiment detects an unauthorized charge/discharge device.
  • the communications unit 110 first receives the second charge/discharge information 373 from the power storage device 300 via the communications network 600 (S602). Then, the second charge/discharge information 373 received by the communications unit 110 is stored by the control unit 130 in the second charge/discharge information 144 in the storage unit 140 (S602).
  • the unauthorization detecting unit 120 determines whether or not multiple position information items, included in the second connection information and associated with a single second identification information item included in the second charge/discharge information, indicate different positions each other (S604).
  • the unauthorization detecting unit 120 determines whether or not the number of power storage devices 300 is larger than or equal to a predetermined threshold (S606).
  • the power storage devices 300 are identified by multiple power storage device identification information items (i) included in the second connection information and (ii) associated with a single second identification information item included in the second charge/discharge information.
  • the unauthorization detecting unit 120 detects that the charge/discharge device connected with the power storage device 300 is an unauthorized one (S608).
  • control unit 130 creates a list of cryptographic modules of unauthorized charge/discharge devices, and stores the list in the storage unit 140.
  • the unauthorization detecting unit 120 determines that the charge/discharge device connected with the power storage device 300 is not an unauthorized one, and finishes the processing.
  • the unauthorization detecting unit 120 may change the above threshold, depending on the kind of a charge/discharge device. In other words, in the case where the charge/discharge device is for a commercial facility or a charging station, the threshold of the unauthorization detecting unit 120 may be set higher than that of the charge/discharge device for the standard home.
  • the unauthorized connection detecting device 100 finishes the processing for detecting an unauthorized charge/discharge device.
  • the first identification information is information for identifying a public key certificate of a power storage device connectable to the charge/discharge device 200.
  • the first identification information is information for identifying a secret key of the power storage device.
  • the second identification information is information for identifying a public key certificate of a charge/discharge device connectable with the power storage device 300.
  • the second identification information is information for identifying a secret key of the charge/discharge device.
  • the charge/discharge device 200 stores in the storage unit 270 a list of information for identifying a secret key of a power storage device.
  • the charge/discharge device 200 identifies the secret key of a power storage device connected to the charge/discharge device 200, and stores in the storage unit 270 the first charge/discharge information 273 using the information for identifying the secret key as the first identification information.
  • the power storage device 300 stores in the storage unit 370 a list of information for identifying a secret key of a charge/discharge device.
  • the power storage device 300 identifies the secret key of a charge/discharge device connected to the power storage device 300, and stores in the storage unit 370 the second charge/discharge information 373 using the information for identifying the secret key as the second identification information.
  • the charge/discharge device 200 or the power storage device 300 may obtain the list from the unauthorized connection detecting device 100 via the communications network 600.
  • the charge/discharge device 200 or the power storage device 300 transmits the key ID of a secret key to the unauthorized connection detecting device 100, and obtains information for identifying the secret key.
  • the unauthorized connection detecting device 100 can prevent an unauthorized connection by performing verification using the received secret key.
  • mutual authentication processing (S104 in FIG. 7 and S204 in FIG. 8 ) performed by a charge/discharge device and a power storage unit. It is noted that the mutual authentication processing is performed (i) by an authentic charge/discharge device 200 and one of an authentic power storage unit and an unauthorized power storage unit, and (ii) by an authentic power storage device 300 and one of an authentic charge/discharge device and an unauthorized charge/discharge device. In the processing below, the mutual authentication is performed by the charge/discharge device 200 and the power storage device 300 for the sake of simplicity.
  • FIG. 13 depicts a flowchart exemplifying mutual authentication processing performed by the charge/discharge device 200 and the power storage device 300 according to Modification 2 of the embodiment.
  • the charge/discharge device 200 first transmits a key ID(IDp_i); namely a secret key, to the power storage device 300 (S702). Moreover, the power storage device 300 transmits a key ID (IDv_i); namely a secret key, to the charge/discharge device 200 (S704).
  • the charge/discharge device 200 searches for the secret key of the power storage device 300 (S706).
  • the power storage device 300 searches for the secret key of the charge/discharge device 200 (S708).
  • the power storage device 300 creates a random number r1, and transmits the random number r1 to the charge/discharge device 200 (S710). Then, the charge/discharge device 200 encrypts the received random number r1 with a secret key SKp_i, creates the random number r2, and transmits the encrypted random number r1 and the random number r2 (S712).
  • the power storage device 300 receives the random number r2 and information created of the encrypted random number r1 with the secret key SKp_i, and checks whether the information matches the result of the encryption of the random number r1 with the secret key SKp_i.
  • the power storage device 300 determines that the information matches the encryption result, the power storage device 300 encrypts the random number r2 with a secret key SKv_i and transmits the encrypted random number r2 to the charge/discharge device 200 (S714). It is noted that in the case where the information fails to match the encryption result, the power storage device 300 returns NG to the charge/discharge device 200, and breaks off the connections to the charge/discharge device 200.
  • the charge/discharge device 200 receives the information created of the encrypted random number r2 with the secret key SKv_i, and checks whether the information matches the result of the encryption of the random number r2 with the secret key SKv_i .
  • the charge/discharge device 200 determines that the information matches the encryption result, the charge/discharge device 200 returns OK to the power storage device 300 (S716). It is noted that in the case where the information fails to match the encryption result, the charge/discharge device 200 returns NG to the power storage device 300, and breaks off the connections to the power storage device 300.
  • the unauthorized connection detecting device 100 detects whether or not a power storage device is an unauthorized power storage device by (i) receiving the first charge/discharge information in which the first identification information for identifying a secret key of a power storage device and the first connection information on a power storage device are associated each other, and (ii) determining, using the first charge/discharge information, whether or not two or more power storage devices associated with a single first identification information are present.
  • a single first identification information item is assigned to one power storage device.
  • the unauthorized connection detecting device 100 can determine that any one or more of the power storage devices are unauthorized ones.
  • the unauthorized connection detecting device 100 can detect an unauthorized power storage device having a cryptographic module of an authentic product introduced in an unauthorized manner.
  • the unauthorized connection detecting device 100 detects whether or not a power storage device is an unauthorized power storage device by determining, based on a relationship between times and positions associated with a single first identification information item, whether or not two or more power storage devices associated with the single first identification information item are present. In other words, in the case where there is an unnatural relationship between times and positions associated with a single first identification information item, the unauthorized connection detecting device 100 determines that two or more power storage devices associated with the single first identification information item are present.
  • the unauthorized connection detecting device 100 determines that two or more power storage devices associated with the single first identification information item are present.
  • the unauthorized connection detecting device 100 can detect an unauthorized power storage device having a cryptographic module of an authentic product introduced in an unauthorized manner.
  • information on a time included in the first charge/discharge information received by the unauthorized connection detecting device 100 is time information indicating the time at which a charge/discharge device charges or discharges a power storage device.
  • Information on a position is position information such as GPS information indicating a position of the charge/discharge device. Since the above features allow the unauthorized connection detecting device 100 to receive easily created first charge/discharge information, the unauthorized connection detecting device 100 can easily detect an unauthorized power storage device having a cryptographic module of an authentic product introduced in an unauthorized manner.
  • the unauthorized connection detecting device 100 detects whether or not a charge/discharge device is an unauthorized charge/discharge device by receiving the second charge/discharge information in which the second identification information and the second connection information are associated each other, and (ii) determining, using the second charge/discharge information, whether or not two or more charge/discharge devices associated with a single second identification information item are present.
  • the second identification information is information for identifying the encryption key of the charge/discharge device
  • the second connection information is information on the charge/discharge device.
  • a single second identification information item is assigned to one charge/discharge device.
  • the unauthorized connection detecting device 100 can determine that any one or more of the power storage devices are unauthorized ones.
  • the unauthorized connection detecting device 100 can detect an unauthorized charge/discharge device having a cryptographic module of an authentic product introduced in an unauthorized manner.
  • the unauthorized connection detecting device 100 detects whether or not a charge/discharge device is an unauthorized charge/discharge device, by determining whether or not two or more charge/discharge device identification information items associated with a single second identification information item indicate mutually different charge/discharge devices, thereby determining whether or not two or more charge/discharge devices associated with the single second identification information item are present.
  • the unauthorized connection detecting device 100 determines that two or more charge/discharge devices associated with the single second identification information item are present.
  • the unauthorized connection detecting device 100 can detect an unauthorized charge/discharge device having a cryptographic module of an authentic product introduced in an unauthorized manner.
  • the charge/discharge device identification information included in the second charge/discharge information received by the unauthorized connection detecting device 100 is position information indicating the position of a charge/discharge device.
  • the unauthorized connection detecting device 100 detects whether or not a charge/discharge device is an unauthorized charge/discharge device by determining whether or not two or more position information items associated with a single second identification information item indicate different positions each other, thereby determining whether or not two or more charge/discharge devices associated with the single second identification information item are present.
  • the two or more position information items are included in the position information.
  • the charge/discharge device is placed at a predetermined position, and never found at two or more sites.
  • the unauthorized connection detecting device 100 determines that two or more charge/discharge devices associated with the single second identification information item are present.
  • the unauthorized connection detecting device 100 can detect an unauthorized charge/discharge device having a cryptographic module of an authentic product introduced in an unauthorized manner.
  • the charge/discharge device identification information included in the second charge/discharge information received by the unauthorized connection detecting device 100 may be direct current information indicating a fluctuation of a direct current provided from a charge/discharge device.
  • the unauthorized connection detecting device 100 may detect whether or not a charge/discharge device is an unauthorized charge/discharge device, by determining whether or not two or more direct current information items associated with a single second identification information item indicate mutually different fluctuations, thereby determining whether or not two or more charge/discharge devices associated with the single second identification information item are present.
  • the two or more direct current information items are included in the direct current information.
  • a direct current provided from a charge/discharge device has fluctuation which is unique to the charge/discharge device itself.
  • the charge/discharge device can be identified.
  • the unauthorized connection detecting device 100 determines that two or more charge/discharge devices associated with the single second identification information item are present.
  • the unauthorized connection detecting device 100 can detect an unauthorized charge/discharge device having a cryptographic module of an authentic product introduced in an unauthorized manner.
  • the unauthorized connection detecting device 100 detects whether or not a charge/discharge device is an unauthorized charge/discharge device by determining whether or not the number of power storage devices, identified by two or more power storage device identification information items associated with a single second identification information item, is larger than or equal to a predetermined threshold, thereby determining whether or not two or more charge/discharge devices associated with the single second identification information item are present.
  • the two or more power storage device identification information items being included in the power storage device identification information.
  • the number of power storage devices to be connected to one charge/discharge device is limited.
  • the unauthorized connection detecting device 100 determines that two or more charge/discharge devices associated with the single second identification information item are present.
  • the unauthorized connection detecting device 100 can detect an unauthorized charge/discharge device having a cryptographic module of an authentic product introduced in an unauthorized manner.
  • the unauthorized connection detecting device 100 receives information via the communications network 600 connected either with the charging station 500 or a charge/discharge device.
  • the unauthorized connection detecting device 100 can easily receive the information.
  • the unauthorized connection detecting device 100 can easily obtain information and detect an unauthorized charge/discharge device having a cryptographic module of an authentic product introduced in an unauthorized manner.
  • the unauthorized connection detecting system 10 includes both of the charge/discharge device 200 and the power storage device 300.
  • the unauthorized connection detecting device 100 may have only one of the charge/discharge device 200 and the power storage device 300.
  • FIG. 14 depicts a block diagram showing a minimal structure of the unauthorized connection detecting device according to the embodiment and Modifications thereof.
  • an unauthorized connection detecting device 101 includes at least the communications unit 110 and the unauthorization detecting unit 120. Such a structure makes it possible to achieve an effect similar to that of the unauthorized connection detecting device 100 according to the embodiment and the modifications thereof.
  • the present invention can be implemented in the form of an unauthorized connection detecting method including characteristic processing to be carried out by the unauthorized connection detecting device or the unauthorized connection detecting system as steps.
  • the steps included in the unauthorized connection detecting method may be implemented in the form of a program to be executed by a computer and a computer-readable recording medium in which the program is stored.
  • the program may be distributed via a recording medium such as a CD-ROM and a transmission medium such as the Internet.
  • each of the constituent elements may be formed of dedicated hardware and implemented by executing software which is suitable to each constituent element.
  • each of the constituent elements may be implemented by a program executing unit, such as a CPU or a processor, reading and executing a software program stored in a recording medium such as a hard disc or a semiconductor memory.
  • each of the constituent elements in the unauthorized connection detecting device shown in FIG. 2 or FIG. 14 may be implemented in the form of software.
  • the software to implement an unauthorized connection detecting device in the embodiment is a program to cause a computer to execute the steps included in the unauthorized connection detecting method below.
  • the unauthorized connection detecting method is employed by an unauthorized connection detecting device for detecting whether or not a power storage device that is connectable to a charge/discharge device for charging or discharging with power is an unauthorized power storage device.
  • the unauthorized connection detecting method includes: receiving by the unauthorized connection detecting device first charge/discharge information in which first identification information and first connection information are associated each other, the first identification information being information for identifying an encryption key of the power storage device used for mutual authentication between the charge/discharge device and the power storage device connectable to the charge/discharge device, and the first connection information being information on the power storage device and obtained when the power storage device is connected to the charge/discharge device; and detecting by the unauthorized connection detecting device whether or not the power storage device connected to the charge/discharge device is the unauthorized power storage device, by determining, using the first identification information and the first connection information included in the received first charge/discharge information, whether or not two or more power storage devices associated with a single first identification information item are present.
  • the unauthorized connection detecting method is employed by an unauthorized connection detecting device for detecting whether or not a charge/discharge device that is connectable with a power storage device and charges or discharges the power storage device is an unauthorized charge/discharge device.
  • the unauthorized connection detecting method includes: receiving by the unauthorized connection detecting device second charge/discharge information in which second identification information and second connection information are associated each other, the second identification information being information for identifying an encryption key of the charge/discharge device used for mutual authentication between the power storage device and the charge/discharge device connectable with the power storage device, and the second connection information being information on the charge/discharge device and obtained when the charge/discharge device is connected with the power storage device; and detecting by the unauthorized connection detecting device whether or not the charge/discharge device connected with the power storage device is the unauthorized charge/discharge device, by determining, using the second identification information and the second connection information included in the received second charge/discharge information, whether or not two or more charge/discharge devices associated with a single second identification information item are present.
  • each of the processing units included in an unauthorized connection detecting device may be implemented in the form of an integrated circuit; namely, the large scale integration (LSI).
  • LSI large scale integration
  • each of the processing units included in FIG. 2 or FIG. 14 may made as separate individual chips, or as a single chip to include a part or all of the processing units.
  • LSI is mentioned but there are instances where, due to a difference in the degree of integration, the designations IC, LSI, super LSI, and ultra LSI are used.
  • the means for circuit integration is not limited to the LSI, and implementation in the form of a dedicated circuit or a general-purpose processor is also available.
  • FPGA Field Programmable Gate Array
  • reconfigurable processor in which connections and settings of circuit cells within the LSI are reconfigurable.
  • the present invention is applicable to an unauthorized connection detecting device which is capable of detecting an unauthorized power storage device or an unauthorized charge/discharge device that have a cryptographic module of an authentic product introduced thereinto in an unauthorized manner.

Landscapes

  • Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Transportation (AREA)
  • Mechanical Engineering (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Charge And Discharge Circuits For Batteries Or The Like (AREA)
  • Electric Propulsion And Braking For Vehicles (AREA)
EP12865737.6A 2012-01-17 2012-11-05 Unauthorized connection detection device, unauthorized connection detection system and method for detecting unauthorized connection Active EP2806526B1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2012007476 2012-01-17
PCT/JP2012/007076 WO2013108318A1 (ja) 2012-01-17 2012-11-05 不正接続検知装置、不正接続検知システム及び不正接続検知方法

Publications (3)

Publication Number Publication Date
EP2806526A1 EP2806526A1 (en) 2014-11-26
EP2806526A4 EP2806526A4 (en) 2016-01-20
EP2806526B1 true EP2806526B1 (en) 2020-01-01

Family

ID=48798776

Family Applications (1)

Application Number Title Priority Date Filing Date
EP12865737.6A Active EP2806526B1 (en) 2012-01-17 2012-11-05 Unauthorized connection detection device, unauthorized connection detection system and method for detecting unauthorized connection

Country Status (5)

Country Link
US (1) US9270463B2 (zh)
EP (1) EP2806526B1 (zh)
JP (1) JP5999566B2 (zh)
CN (1) CN103392283B (zh)
WO (1) WO2013108318A1 (zh)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8898278B2 (en) * 2006-08-10 2014-11-25 Gridpoint, Inc. Connection locator in a power aggregation system for distributed electric resources
JP5791693B2 (ja) * 2013-12-17 2015-10-07 三菱電機株式会社 車載装置
GB2522851A (en) * 2014-02-05 2015-08-12 Bombardier Transp Gmbh A method of communication between a vehicle and a wayside control unit for controlling an inductive energy transfer to the vehicle, a vehicle and an arrangeme
US9870462B2 (en) * 2014-09-22 2018-01-16 Intel Corporation Prevention of cable-swap security attack on storage devices
KR101877602B1 (ko) * 2015-10-20 2018-07-11 현대자동차주식회사 전기차 전력 전송 시스템의 보안 방법 및 장치
CN106953374B (zh) * 2016-01-06 2019-11-05 松下知识产权经营株式会社 服务器装置的控制方法和服务器装置
CN107545648B (zh) * 2016-06-24 2023-02-07 宁波三星智能电气有限公司 一种用于电动汽车的充电桩管理系统
CN107545649B (zh) * 2016-06-24 2023-02-03 宁波三星智能电气有限公司 一种用于电动汽车的充电桩管理系统
DE102017206352A1 (de) * 2017-04-12 2018-10-18 Audi Ag Verfahren und System zum Steuern eines Fahrzeugs
TWM575626U (zh) 2017-06-26 2019-03-11 美商米沃奇電子工具公司 電池充電器
CN108695934A (zh) * 2018-06-05 2018-10-23 广西南宁衡讯信息科技有限公司 无线充电管理方法、安装在无线充电设备上的管理设备和无线充电设备
DE102019202247A1 (de) * 2019-02-19 2020-08-20 Siemens Aktiengesellschaft Verfahren und Anordnung zum Schutz einer Ladestation vor missbräuchlicher Nutzung
CN110077256B (zh) * 2019-05-18 2020-11-13 六安永贞匠道机电科技有限公司 一种电动汽车加密式充电对接方法
WO2021065929A1 (ja) 2019-10-04 2021-04-08 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ 充電ステーション、電池管理システム、及び、充電方法
WO2021145360A1 (ja) 2020-01-17 2021-07-22 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ バッテリーデータ管理方法、バッテリーデータ管理システム、及びプログラム
WO2021157259A1 (ja) 2020-02-04 2021-08-12 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ 管理装置、管理システム、管理方法、および、プログラム
JP7527131B2 (ja) 2020-02-04 2024-08-02 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ 管理装置、管理システム、管理方法、および、プログラム
DE102022120464A1 (de) 2022-08-12 2024-02-15 Bayerische Motoren Werke Aktiengesellschaft Verfahren zum Authentifizieren eines Fahrzeugs an einer Ladestation, computerlesbares Medium, System, und Fahrzeug
TWI836601B (zh) 2022-09-14 2024-03-21 起而行綠能股份有限公司 具安全通訊之充電控制系統及其方法

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2462677A (en) * 2008-08-20 2010-02-24 Park And Power Ltd Preventing unauthorised battery charging of electric vehicle

Family Cites Families (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1193823A (zh) * 1997-03-19 1998-09-23 曾令远 蓄电池的追踪管理装置
US6490513B1 (en) * 2001-08-22 2002-12-03 Matsushita Electrical Industrial Co., Ltd. Automobile data archive system having securely authenticated instrumentation data storage
JP3768224B1 (ja) 2004-12-02 2006-04-19 ソニー株式会社 電池パック、充電制御方法およびアプリケーション機器
JP4951877B2 (ja) * 2005-05-25 2012-06-13 日本電気株式会社 電池パック認証システム及び方法、電子機器
JP2009512035A (ja) 2005-10-14 2009-03-19 リサーチ イン モーション リミテッド モバイルデバイスのためのバッテリーパックの認証
JP4879650B2 (ja) * 2006-05-15 2012-02-22 ソニー株式会社 通信システムおよび認証方法、情報処理装置および情報処理方法、並びにバッテリ
JP4366385B2 (ja) 2006-08-31 2009-11-18 株式会社東海理化電機製作所 充電システム
US20090082957A1 (en) * 2007-09-20 2009-03-26 Shai Agassi Electric Vehicle Network
JP4407753B2 (ja) 2008-01-15 2010-02-03 トヨタ自動車株式会社 電動車両の充電システム
JP4506857B2 (ja) * 2008-03-11 2010-07-21 株式会社デンソー 充電管理システム、及び充電履歴記憶管理装置
US8633801B2 (en) * 2008-04-09 2014-01-21 Panasonic Corporation Battery authentication system, electronic device, battery, and battery charger
US8266075B2 (en) * 2008-06-16 2012-09-11 International Business Machines Corporation Electric vehicle charging transaction interface for managing electric vehicle charging transactions
US7991665B2 (en) * 2008-06-16 2011-08-02 International Business Machines Corporation Managing incentives for electric vehicle charging transactions
US20100094496A1 (en) * 2008-09-19 2010-04-15 Barak Hershkovitz System and Method for Operating an Electric Vehicle
JP4713623B2 (ja) * 2008-09-25 2011-06-29 株式会社日立製作所 充放電管理装置
JP2010179694A (ja) * 2009-02-03 2010-08-19 Denso Corp プラグイン自動車管理システム
JP2010200528A (ja) 2009-02-26 2010-09-09 Omron Corp 情報処理装置及び方法、プログラム、並びに情報処理システム
WO2010100081A2 (de) * 2009-03-03 2010-09-10 Rwe Ag Verfahren und vorrichtung zum laden von elektrofahrzeugen
US8354913B2 (en) * 2009-07-23 2013-01-15 Chargepoint, Inc. Authorization in a networked electric vehicle charging system
JP5490473B2 (ja) * 2009-09-15 2014-05-14 ルネサスエレクトロニクス株式会社 データ処理システム、電気自動車及びメンテナンスサービスシステム
US10787090B2 (en) * 2009-10-24 2020-09-29 Paul S. Levy Method and process of administrating recharging of electric vehicles using low cost charge stations
US20110099111A1 (en) * 2009-10-24 2011-04-28 Levy Paul S Method and Process of billing for goods leveraging a single connection action
JP5788636B2 (ja) 2009-12-16 2015-10-07 ソニー株式会社 電動移動体、管理装置、駆動管理方法、及び充電装置
US20110191186A1 (en) * 2010-02-03 2011-08-04 Levy Paul S Method of autonomously recommending charging event of electric vehicle based on multiple factors and displaying carbon footprint data and personalized advertising via the vehicle display
DE102010026689A1 (de) 2010-07-09 2012-01-12 Siemens Aktiengesellschaft Verfahren und Steuereinheit zum Laden eines Fahrzeugakkumulators
JP2012050267A (ja) * 2010-08-27 2012-03-08 Denso Corp 電池管理装置
US7986126B1 (en) * 2010-10-01 2011-07-26 Toyota Motor Sales, U.S.A., Inc. Automated system for determining whether vehicle charge station is publicly accessible
JP2012128633A (ja) * 2010-12-15 2012-07-05 Aisin Seiki Co Ltd 電気自動車の充電予約方法および充電予約装置
US9623761B2 (en) * 2010-12-22 2017-04-18 Ford Global Technologies, Llc Vehicle and method for authenticating a charge station
DE102011008675A1 (de) * 2011-01-15 2012-07-19 Daimler Ag Verfahren zum Aufladen einer Batterie eines Fahrzeuges
JP2013037676A (ja) * 2011-07-12 2013-02-21 Nissan Motor Co Ltd 車両情報提供装置及び車両情報管理システム
JP5454537B2 (ja) * 2011-09-22 2014-03-26 株式会社デンソー 電動車両の充電制御システム
TWI446684B (zh) * 2011-11-17 2014-07-21 Hon Hai Prec Ind Co Ltd 電動車的充電控制系統及充電控制方法
US8798852B1 (en) * 2013-03-14 2014-08-05 Gogoro, Inc. Apparatus, system, and method for authentication of vehicular components

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2462677A (en) * 2008-08-20 2010-02-24 Park And Power Ltd Preventing unauthorised battery charging of electric vehicle

Also Published As

Publication number Publication date
EP2806526A1 (en) 2014-11-26
EP2806526A4 (en) 2016-01-20
CN103392283A (zh) 2013-11-13
US20140059350A1 (en) 2014-02-27
US9270463B2 (en) 2016-02-23
CN103392283B (zh) 2016-10-12
JPWO2013108318A1 (ja) 2015-05-11
WO2013108318A1 (ja) 2013-07-25
JP5999566B2 (ja) 2016-09-28

Similar Documents

Publication Publication Date Title
EP2806526B1 (en) Unauthorized connection detection device, unauthorized connection detection system and method for detecting unauthorized connection
US10740495B2 (en) Host/battery with public/private busses, public memory, processor, and private memory
EP2858211B1 (en) Apparatus, system, and method for detecting unauthorized connections of a charge/discharge device
CN111383021B (zh) 基于区块链网络的节点管理方法、装置、设备及介质
US9635557B2 (en) Reliability for location services
CN107967640B (zh) 移动电源归还方法、装置、终端和计算机可读存储介质
CN106464698A (zh) 经由信任链保护无线网状网络
CN106331974B (zh) 听力设备中的权限管理
CN113168481A (zh) 设备固有加密密钥生成器及方法
CN111680282A (zh) 基于区块链网络的节点管理方法、装置、设备及介质
CN108196659A (zh) 充电管理方法、装置、存储介质及终端设备
CN110119639A (zh) 一种车辆充电设备防伪认证方法、装置及系统
EP3113513A1 (en) Access rights management in a hearing device
EP4044500B1 (en) Electronic device for ensuring integrity of electronic device intrinsic information, and operating method therefor
JP2019149707A (ja) 検証装置および検証システム
KR20170030330A (ko) 분리 및 위치 추적이 가능한 배터리 팩
CN102355506A (zh) 域管理和支配方法以及其设备
CN107315158B (zh) 费控电能表的数据回抄功能测试方法及系统
CN112073199B (zh) 一种电池认证方法、装置、终端设备及介质
JP2008197706A (ja) 認証装置、被認証装置、及び電池認証システム
CN106022141A (zh) 一种身份证读取方法和身份证读卡终端
CN118264410A (zh) 车载无线终端唤醒方法及相关设备
CN115941210A (zh) 一种物联网数据可信度的验证方法、装置、设备、介质
CN101930507A (zh) 计算机的双向认证系统与其方法

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20140429

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LT

DAX Request for extension of the european patent (deleted)
RA4 Supplementary search report drawn up and despatched (corrected)

Effective date: 20151217

RIC1 Information provided on ipc code assigned before grant

Ipc: H02J 7/00 20060101ALI20151211BHEP

Ipc: H01M 10/48 20060101ALI20151211BHEP

Ipc: H04L 9/32 20060101ALI20151211BHEP

Ipc: H02J 7/02 20060101AFI20151211BHEP

Ipc: B60L 11/18 20060101ALI20151211BHEP

Ipc: H01M 10/42 20060101ALI20151211BHEP

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20161109

RIC1 Information provided on ipc code assigned before grant

Ipc: B60L 53/65 20190101ALI20190423BHEP

Ipc: H02J 7/00 20060101ALI20190423BHEP

Ipc: H02J 7/02 20160101AFI20190423BHEP

Ipc: B60L 53/14 20190101ALI20190423BHEP

Ipc: H01M 10/48 20060101ALI20190423BHEP

Ipc: B60L 53/68 20190101ALI20190423BHEP

Ipc: H04L 9/32 20060101ALI20190423BHEP

Ipc: B60L 53/31 20190101ALI20190423BHEP

Ipc: H01M 10/42 20060101ALI20190423BHEP

Ipc: B60L 53/60 20190101ALI20190423BHEP

Ipc: B60L 53/30 20190101ALI20190423BHEP

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20190607

GRAJ Information related to disapproval of communication of intention to grant by the applicant or resumption of examination proceedings by the epo deleted

Free format text: ORIGINAL CODE: EPIDOSDIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

INTC Intention to grant announced (deleted)
GRAR Information related to intention to grant a patent recorded

Free format text: ORIGINAL CODE: EPIDOSNIGR71

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20191008

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

Ref country code: AT

Ref legal event code: REF

Ref document number: 1221013

Country of ref document: AT

Kind code of ref document: T

Effective date: 20200115

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602012067000

Country of ref document: DE

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20200101

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200527

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200401

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200501

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200402

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200401

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602012067000

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 1221013

Country of ref document: AT

Kind code of ref document: T

Effective date: 20200101

26N No opposition filed

Effective date: 20201002

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20201105

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20201105

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20201130

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20201130

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20201130

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20201105

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20201130

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20201105

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

Ref country code: MT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200101

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20201130

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20221123

Year of fee payment: 11

REG Reference to a national code

Ref country code: DE

Ref legal event code: R119

Ref document number: 602012067000

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20240601